1. Data mining and automated data analysis play complementary
roles in _____
2.These tools above are effective tools for applications in crime
prevention and _____
3. _____is very helpful to unravel secrets in organized crimes
like terrorism, assassination, armed robbery and electoral
practices.
4. Another name for Knowledge Discovery in Database (KDD)
is ______
5. _____is the process of analysing data from different
perspectives and summarising it into useful information.
6. _______ is the tool designated to find previously unknown
knowledge through links, association and patterns in data.
7. _______helps us in our analysis of data to have more
information about the subject and gives a clearer picture of the
subject.
8.One vital element of the subject based query is _______
9. Link analysis is very popular among_______ practitioners
10_______involves conducting our investigation by moving
from unknown to known.
11. ______is the tool to probe further as a search light to what
may constitute an act of criminality.
12. The introduction of ______ system has really impacted
positively on the task of data mining.
13. The process through which we use computer to develop a
large database is known as ______
14. According to DeRosa, the process which involves
transforming the data to make them useful is known as _______
15.The process of wrongfully labeling an innocent person as a
criminal due to mistakes is the result of our automated data
analysis is called ______
16. The quality of the decision we make after our automated
analysis largely determine the amount of success we record in
the course of our ______
17. _____is a subfield in criminology and security studies
18.____ is often applied at various levels of law enforcement in
any community to know the situations of crime and ways to
reduce it.
19. A law enforcement function that involves a systematic
analysis for identifying and analysing patterns and trends in
crime and disorder is called _______
20. ______is an essential tool of crime analysis
CSS244 PART 1 AWSNERS
1. intelligence reporting
2. Detection
3. data mining
4. data mining
5. data mining
6. automated data analysis
7. subject-based query
8. link analysis
9. public security
10. pattern-based queries
11. pattern-based queries
12. computing
13. data warehouse
14. data aggregation
15. false positive errors
16. investigation
17. crime analysis
18. crime analysis
19. crime analysis
20. data mining
PART 2
1. _____is the direct application that comes from considering
the inherent geography in crime
2. _____is essential to tactical analysis necessary for crime
forecasting and geographic profiling
3. ______ is very useful to assist crime analysis to locate the
hot spots or locations where.
4. The introduction of mobile computing with global
positioning system (GPS) technologies has made it
possible to detect any incidence of _____________
5. In Nigeria, where the number of police personnel is very
inadequate to provide any meaningful security calls for
_______
6. The use of crime mapping through installation of security
gadgets like CCTV's and secret camera's are helpful to
identify ______
7. The act of having an understanding of crime distribution
and information about the demography is known as______
8. ______enables the law enforcements to identify the most
probable residential locations that criminals live.
9. In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko,
Iba, Ijora-Badia are examples of_______]in criminal
locations
10. ______is a method through which we analyse crime
11. _________enables security practitioners to put
observable crime data to scientific testing through the
processes of data collation, analysis and interpretation
12. Traditionally, the state is the custodian and ultimate
beneficiary of the monopoly use of violence as advocated
by_____
13. The period in which threat to security usually involved
state to state aggression is ______
14 The emergence of the cold war started in the year
_____
15. The end of the cold war in _____ has widened the scope
of security studies.
16. Security threat can be described as a capacity to destroy
the vital interests of other considered as ______
17 . The threat which involve the malicious activities of man
is known as_____
18. The threat which includes flood and cyclone is_____
19. The geological security threat is an aspect of_____ threat.
20. Climatic hazards basically include hurricane, flood and
____
21 The threat which involves entrapment of the environment
with various forms of pollution is _______
22. The factors chiefly responsible for various environmental
pollutions are _______
23. Basically, any intentional and unintentional criminal actions
are_____
24. The activities of disloyal employees can affect the collapse
of any _____if adequate mitigation measures are not taken .
25. A threat which often involves the use of instruments of
intimidation and coercion by a party(ies) against another party is
_____
26. Piracy is a violent crime and robbery which takes place on
the _____
27. Piracy usually involves a very violent act perpetrated by
private parties of no _____affiliation
28. Piracy in the 17th and 18th centuries attracted_____ penalty
against the offenders
29. During these periods in [Europe] pirates caught were
paraded before the public and later subject to execution.
30. The type of robbery been phenomenal in South Africa,
U.S.A, Sweden and Nigeria is _____

PART 3
1. The mild application of intimidation and violence to bus
passengers by criminal gangs is known as _______
2. A threat that takes place on the road, streets, or even
bridges is_____
3. A threat where the offenders use deadly weapons in the
course of carrying out their dastardly act is called______
4. A criminal act that relate to illegal acquisition of another
person's property is called _____
5. The deliberate act of destroying another person's property
by fire is _____
6. The transportation of a person against the person's will,
usually to hold the person with illegal authority for ransom
is______
7. The transportation of a woman against her will for ransom
is labelled ______
8. A criminal offence which occurs when a person unlawfully
obtains services from a person is______
9. Insurgency is a form of _____security threat .An organised
rebellion is aimed at over
10. throwing a constituted_____ through the use of
subversion and armed conflict
11. The Italian word for work-to-rule strike is_____
12. Another name for sick-out strike is ____
13. Etymologically, the word Assassin emanated from the
Arabic word _____
14. Traditionally, assassination was synonymous to
covet_____ sanctioned killing of any person.
15. Another name for demonstration is ______
16. The threat which usually attract crowds with strong
emotional convictions to act in unlawful ways is called
_____
17. ______defined terrorism as the theory behind the
method whereby an organised group seeks to achieve its
avowed aims through the use of violence
18. Terrorism is a ferocious use of violence, a form of
______
19. Violent criminal behaviors designed primarily to
generate fear in the community for political purposes
is________
20. The use of poisonous gases on any targeted persons
and ecosystem is _______
21. Hydrogen cyanide (AC) is a chemical agent that acts
on the_______
22. Chloroacetophenone (CN) is a chemical agent used
for_____
23. Adamsite (DM) is a chemical agent used as_______
24.The use of information technology to organise and
execute attacks against networks is ___
25 The quality of the decision we make after our automated
analysis largely determine the amount of success we record in
the course of our_____
26 _______is a subfield in criminology and security studies
27_______is often applied at various levels of law enforcement
in any community to know the situations of crime and ways to
reduce it.
28. A law enforcement function that involves a systematic
analysis for identifying and analysing patterns and trends in
crime and disorder is called ______
29. ______is an essential tool of crime analysis
30_______is the direct application that comes form considering
the inherent geography in crime

PART 4
1. _______is essential to tactical analysis necessary for crime
forecasting and geographic profiling
2. ________is very useful to assist crime analysis to locate the
hot spots or locations where particular crimes often take
place.
3. The introduction of mobile computing with global
positioning system (GPS) technologies has made it possible
to detect any incidence of ______
4. In Nigeria, where the number of police personnel is very
inadequate to provide any meaningful security calls for
_______
5. The use of crime mapping through installation of security
gadgets like CCTV's and secret camera's are helpful to
identify ______
6. The act of having an understanding of crime distribution
and information about the demography is known as ______
7. _______ enables the law enforcements to identify the most
probable residential locations that criminals live.
8. In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko,
Iba, Ijora-Badia are examples of_______in criminal
locations.
9. _____ is a method through which we analyse crime
10. The type of demonstration that can lead to the
breakdown of law and order is ______